Cyberattacks evolve daily, and defenders are forced to adapt at the same rate. Cybersecurity best practices, however, are updated and codified much less frequently. There is broad experimentation in the field, and it takes some time for authoritative working groups to sort out which new practices and controls are practical and consistently effective for a large cross-section of … [Read more...] about 3 Recommendations for a Next-Gen Cybersecurity Framework
cybersecurity
Elastic wins CyberSecurity Breakthrough Award for Cloud Platform of the Year 2023
Elastic Security for Cloud also includes cloud-native vulnerability management capabilities. This continuously uncovers vulnerabilities in AWS EC2 with zero resource utilization on workloads. Elastic identifies, reports, and guides remediation of these vulnerabilities to help you identify and respond to potential risk.Elastic Security for Cloud is also supported by Elastic … [Read more...] about Elastic wins CyberSecurity Breakthrough Award for Cloud Platform of the Year 2023
Essential Guide to Cybersecurity Compliance
SOC 2, ISO, HIPAA, Cyber Essentials – all the security frameworks and certifications today are an acronym soup that can make even a compliance expert's head spin. If you're embarking on your compliance journey, read on to discover the differences between standards, which is best for your business, and how vulnerability management can aid compliance. What is cybersecurity … [Read more...] about Essential Guide to Cybersecurity Compliance
CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds
A new State of SaaS Security Posture Management Report from SaaS cybersecurity provider AppOmni indicates that Cybersecurity, IT, and business leaders alike recognize SaaS cybersecurity as an increasingly important part of the cyber threat landscape. And at first glance, respondents appear generally optimistic about their SaaS cybersecurity. Over 600 IT, cybersecurity, and … [Read more...] about CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds
Video Series Spotlights Cybersecurity Leaders
You don’t have a malware problem — you have an adversary problem. CrowdStrike has relentlessly focused on finding and stopping the humans behind cyberattacks. Today, we’re launching a new series that highlights the people who fight back against these threats every day. We’re excited to announce the launch of the Protectors Spotlight, a new series of short videos celebrating the … [Read more...] about Video Series Spotlights Cybersecurity Leaders
Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events
Aug 03, 2023THNCyber Threat / Network Security Microsoft is warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber risk surface of live sporting events is "rapidly expanding." "Information on athletic performance, competitive advantage, and personal information is a lucrative target," the company said in a Cyber Signals report shared … [Read more...] about Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events
Consolidating Cybersecurity with CrowdStrike | CrowdStrike
As adversaries continue to evolve their tactics and techniques, organizations are scrambling to shore up their security posture. Security teams have historically turned to point products to fill gaps in their defenses, driving the issue of tool sprawl: The average enterprise deploys 45 cybersecurity-related tools, according to the Ponemon Institute. When it comes to security, … [Read more...] about Consolidating Cybersecurity with CrowdStrike | CrowdStrike
U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
Jun 24, 2023Ravie LakshmananThreat Intel / Zero Day The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. This comprises three vulnerabilities that Apple patched this week (CVE-2023-32434, CVE-2023-32435, and CVE-2023-32439), two flaws in VMware … [Read more...] about U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog
Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
As Threat Actors Continuously Adapt their TTPs in Today's Threat Landscape, So Must You Earlier this year, threat researchers at Cybersixgill released the annual report, The State of the Cybercrime Underground. The research stems from an analysis of Cybersixgill's collected intelligence items throughout 2022, gathered from the deep, dark and clear web. The report examines the … [Read more...] about Activities in the Cybercrime Underground Require a New Approach to Cybersecurity
High risk but low funding: How UK universities can do cybersecurity on a budget
According to recent research from the Department of Science, Innovation and Technology, over the past year, 85% of UK higher education institutions reported finding a cyber breach. This number is significantly higher compared to UK businesses — of which only 32% reported breaches. Perhaps what’s even more worrying is the frequency of higher ed breaches: half of higher ed … [Read more...] about High risk but low funding: How UK universities can do cybersecurity on a budget